Microsoft Lync Netscaler Reverse Proxy Nginx Re' title='Microsoft Lync Netscaler Reverse Proxy Nginx Re' />Implementing Cisco Network Security Exam 2.Exam Description.The Implementing Cisco Network Security IINS exam 2. Microsoft Word Download For Free 2003 Gmc on this page. This exam tests the candidates knowledge of secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web and email content security, and endpoint security.This CCNA Security certification exam validates skills for installation, troubleshooting, and monitoring of a secure network to maintain integrity, confidentiality, and availability of data and devices.This exam also shows competency in the technologies that Cisco uses in its security infrastructure.Candidates can prepare for this exam by taking the Implementing Cisco Network Security IINS course.The following topics are general guidelines for the content likely to be included on the exam.However, other related topics may also appear on any specific delivery of the exam.In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.Common security principles.Describe confidentiality, integrity, availability CIA1.Describe SIEM technology.Identify common security terms.Microsoft Lync Netscaler Reverse Proxy Nginx Vs Apache' title='Microsoft Lync Netscaler Reverse Proxy Nginx Vs Apache' />Identify common network security zones.Common security threats.Identify common network attacks.Describe social engineering.Identify malware.Classify the vectors of data lossexfiltration.Cryptography concepts.Describe key exchange.Describe hash algorithm.Compare and contrast symmetric and asymmetric encryption.Describe digital signatures, certificates, and PKI1.Implementing Cisco Network Security Exam 210260 tests the candidate knowledge of managing secure access, VPN encryption, firewalls, secure network infrastructure.The AWS Architecture Center provides best practices and architectural blueprints for building applications.Examples include Web Hosting and Log Analysis.Describe network topologies.Campus area network CAN1.Cloud, wide area network WAN1.Data center. 1. 4.Small officehome office SOHO1.Network security for a virtual environment.Microsoft Lync Netscaler Reverse Proxy Nginx LocationMicrosoft Lync Netscaler Reverse Proxy Nginx PhpSecure management.Compare in band and out of band.Configure secure network management.Configure and verify secure access through SNMP v.ACL2. 1. d Configure and verify security for NTP2.Use SCP for file transfer.AAA concepts. 2. 2.Describe RADIUS and TACACS technologies.Configure administrative access on a Cisco router using TACACS2.Verify connectivity on a Cisco router to a TACACS server.Explain the integration of Active Directory with AAA2.Describe authentication and authorization using ACS and ISE2.X authentication.Identify the functions 8.X components. 2. 4 BYOD2.Describe the BYOD architecture framework.Describe the function of mobile device management MDM3.VPN concepts. 3. 1.Describe IPsec protocols and delivery modes IKE, ESP, AH, tunnel mode, transport mode3.Describe hairpinning, split tunneling, always on, NAT traversal.Remote access VPN3.Implement basic clientless SSL VPN using ASDM3.Verify clientless connection.Implement basic Any.Connect SSL VPN using ASDM3.Verify Any. Connect connection.Identify endpoint posture assessment.Site to site VPN3.Implement an IPsec site to site VPN with pre shared key authentication on Cisco routers and ASA firewalls 3.Verify an IPsec site to site VPN4.Security on Cisco routers.Configure multiple privilege levels 4.Configure Cisco IOS role based CLI access 4.Implement Cisco IOS resilient configuration.Securing routing protocols.Implement routing update authentication on OSPF4.Securing the control plane.Explain the function of control plane policing.Common Layer 2 attacks.Describe STP attacks.Describe ARP spoofing.Describe MAC spoofing.Describe CAM table MAC address table overflows.Describe CDPLLDP reconnaissance.Describe VLAN hopping.Describe DHCP spoofing.Mitigation procedures.Mitigation procedures 4.Implement DHCP snooping 4.Implement Dynamic ARP Inspection 4.Implement port security 4.Describe BPDU guard, root guard, loop guard 4.Verify mitigation procedures.VLAN security. 4.Describe the security implications of a PVLAN4.Describe the security implications of a native VLAN5.Describe operational strengths and weaknesses of the different firewall technologies.Proxy firewalls. 5.Application firewall.Personal firewall.Compare stateful vs.Operations. 5. 2.Function of the state table.Implement NAT on Cisco ASA 9.Static. 5. 3. b Dynamic.PAT5. 3. d Policy NAT5.Verify NAT operations.Implement zone based firewall.Zone to zone. 5. 4.Self zone. 5. 5 Firewall features on the Cisco Adaptive Security Appliance ASA 9.Configure ASA access management.Configure security access policies.Configure Cisco ASA interface security levels.Configure default Cisco Modular Policy Framework MPF5.Describe modes of deployment routed firewall, transparent firewall5.Describe methods of implementing high availability.Describe security contexts.Describe firewall services.Describe IPS deployment considerations.Network based IPS vs.IPS6. 1. b Modes of deployment inline, promiscuous SPAN, tap6.Placement positioning of the IPS within the network6.False positives, false negatives, true positives, true negatives.Describe IPS technologies.Rulessignatures. Detectionsignature engines.Trigger actionsresponses drop, reset, block, alert, monitorlog, shun6.Blacklist static and dynamic7.Describe mitigation technology for email based threats.SPAM filtering, anti malware filtering, DLP, blacklisting, email encryption.Describe mitigation technology for web based threats.Local and cloud based web proxies.Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLSSSL decryption.Describe mitigation technology for endpoint threats.Anti virusanti malware.Personal firewallHIPS7.Hardwaresoftware encryption of local data.Download Course Details.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |